28.6. Security

Access control

We have seen above that a user might have to fill in a form before being allowed to see a document. The owner of the document associates a password and a list of user names with it and typically tells collaborators by telephone or by email what their names and passwords are. They must then fill in the form with this information before seeing the document. The approach is suitable as part of the management of collaborative authoring by distributed groups. Synchronization of access is currently left to the collaborators. This control is typically carried out through a combination of Readme files, email and telephone. The W3C is currently turning its attention to support for collaborative authoring.

An example where ...

Get Operating Systems: Concurrent and Distributed Software Design now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.